Twitter let that one slip a few years ago if I recall correctly, it's certainly not a secret.

Whilst knowing anything about a company's infrastructure is potentially useful to an attacker I don't think this is especially useful information. AFAIK the use torrent to propagate data between servers within their own network which makes a lot of sense - servers will update themselves from neighboring servers that have what they want. They'd have to use *some* protocol to do that and at least it's not FTP!

About the author

Paul Ducklin is a passionate security proselytiser. (That's like an evangelist, but more so!) He lives and breathes computer security, and would be happy for you to do so, too.
Paul won the inaugural AusCERT Director's Award for Individual Excellence in Computer Security in 2009.
Follow him on Twitter: @duckblog